quot;For IPv6 access lists, the wildcard masks are not usually used. All source and destination addresses are notated in the form of prefixes. Therefore, it is important that subnets that are to be grouped in an access list falling within a summarized address range.quot;

Question No: 47

Which one of these could you implement to sustain a large DDoS attack?

Stateful firewall

uRPF

Connections limits and timeouts

Access-lists

Answer: C

Question No: 48

When is a first-hop redundancy protocol needed in the distribution layer?

when the design implements Layer 2 between the access and distribution blocks

when multiple vendor devices need to be supported

when preempt tuning of the default gateway is needed

when a robust method of backing up the default gateway is needed

Answer: A

Question No: 49

Which option lists the EIGRP minimum timer settings for hello and dead timers in seconds?

4 and 6

2 and 4

2 and 6

Both 6

Answer: C

Question No: 50

How does ERS use the VLAN tag?

to provide service internetworking

to support transparency for Layer 2 frames

as a connection identifier to indicate destination

as a mapping to the DLCI in service internetworking

to provide a trunk by which all VLANs can navigate from one site to one or multiple sites